MEDIUM · 5.0

CVE-2007-1349

PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial...

Vulnerability Description

PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.

CVSS Score

5.0

MEDIUM

AV:N/AC:L/Au:N/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
ApacheMod Perl< 1.30
CanonicalUbuntu Linux6.06
RedhatSatellite5.1
RedhatEnterprise Linux Desktop3.0
RedhatEnterprise Linux Eus4.5
RedhatEnterprise Linux Server3.0
RedhatEnterprise Linux Workstation3.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2007-1349?

CVE-2007-1349 is a vulnerability with a CVSS score of 5.0 (MEDIUM). PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial...

How severe is CVE-2007-1349?

CVE-2007-1349 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2007-1349?

Check the references section above for vendor advisories and patch information. Affected products include: Apache Mod Perl, Canonical Ubuntu Linux, Redhat Satellite, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus.